You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/governance/access-reviews-application-preparation.md
+8-4Lines changed: 8 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,14 +62,16 @@ In order to permit a wide variety of applications and IT requirements to be addr
62
62
The integration patterns listed above are applicable to third party SaaS applications, or applications that have been developed by or for your organization.
63
63
64
64
* Some Microsoft Online Services, such as Exchange Online, use licenses. While user's licenses can't be reviewed directly, if you're using group-based license assignments, with groups with assigned users, you can review the memberships of those groups instead.
65
-
* Some applications may use delegated user consent to control access to Microsoft Graph or other resources. As consents by each user aren't controlled by an approval process, consents aren't reviewable in Azure AD. Instead, you can review who is able to connect to the application through Conditional Access policies, that could be based on application role assignments or group memberships.
65
+
* Some applications may use delegated user consent to control access to Microsoft Graph or other resources. As consents by each user aren't controlled by an approval process, consents aren't reviewable in. Instead, you can review who is able to connect to the application through Conditional Access policies, that could be based on application role assignments or group memberships.
66
66
* If the application doesn't support federation or provisioning protocols, then you'll need a process for manually applying the results when a review completes. For an application that only supports password SSO integration, if an application assignment is removed when a review completes, then the application won't show up on the *myapps* page for the user, but it won't prevent a user who already knows the password from being able to continue to sign into the application. For your on-premises applications, see [govern the users of an application that does not support provisioning](identity-governance-applications-not-provisioned-users.md). For SaaS applications, please [ask the SaaS vendor to onboard to the app gallery](../manage-apps/v2-howto-app-gallery-listing.md) for federation or provisioning by updating their application to support a standard protocol.
67
67
68
68
## Check the application is ready for the review
69
69
70
-
Now that you have identified the integration pattern for the application, check the application as represented in Azure AD is ready for review.
70
+
Now that you have identified the integration pattern for the application, check the application as represented in Microsoft Entra ID is ready for review.
71
71
72
-
1. In the Azure portal, click **Azure Active Directory**, click **Enterprise Applications**, and check whether your application is on the [list of enterprise applications](../manage-apps/view-applications-portal.md) in your Azure AD tenant.
72
+
1. Sign in to the [Microsoft Entra admin Center](https://entra.microsoft.com) as at least a [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
73
+
1. Browse to > **Identity** > **Applications** > **Enterprise Applications**.
74
+
1. Here you can check to see whether your application is on the [list of enterprise applications](../manage-apps/view-applications-portal.md) in your tenant.
73
75
1. If the application is not already listed, then check if the application is available the [application gallery](../manage-apps/overview-application-gallery.md) for applications that can be integrated for federated SSO or provisioning. If it is in the gallery, then use the [tutorials](../saas-apps/tutorial-list.md) to configure the application for federation, and if it supports provisioning, also [configure the application](../app-provisioning/configure-automatic-user-provisioning-portal.md) for provisioning.
74
76
1. If the application is not already listed, but uses AD security groups and is a web application, [add the application for remote access through Application Proxy](../app-proxy/application-proxy-add-on-premises-application.md) and [configure group writeback to AD](../hybrid/connect/how-to-connect-group-writeback-v2.md).
75
77
1. If the application is not already listed, uses AD security groups and is not a web application, then [configure group writeback to AD](../hybrid/connect/how-to-connect-group-writeback-v2.md) and continue at the next section.
@@ -104,7 +106,9 @@ Now that you have identified the integration pattern for the application, check
104
106
105
107
Next, if the application integration also requires one or more groups to be reviewed, as described in pattern B, then check each group is ready for review.
106
108
107
-
1. In the Azure portal experience for Azure AD, click **Groups**, and then search for and select each group from the list.
109
+
1. Sign in to the [Microsoft Entra admin Center](https://entra.microsoft.com) as at least a [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
110
+
1. Browse to > **Groups**.
111
+
1. Search for and select each group from the list.
108
112
1. On the **Overview** tab, verify that the **Membership type** is **Assigned**, and the **Source** is **Cloud**. If the application uses a dynamic group, or a group synchronized from on-premises, then those group memberships can't be changed in Azure AD. We recommend converting the application to groups created in Azure AD with assigned memberships, then copy the member users to that new group.
109
113
1. Change to the **Roles and administrators** tab. This tab displays the administrative roles, that give rights to control the representation of the group in Azure AD, not the access rights in the application. For each administrative role that allows changing group membership and has users in that administrative role, ensure that only authorized users are in that role.
110
114
1. Change to the **Members** tab. Verify that the members of the group are users, and that there are no non-user members or nested groups. If there are no members of a group when the review starts, the review of that group will complete immediately.
Copy file name to clipboardExpand all lines: articles/active-directory/governance/access-reviews-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,8 +57,8 @@ Depending on what you want to review, you'll either create your access review in
57
57
| --- | --- | --- | --- |
58
58
| Security group members</br>Office group members | Specified reviewers</br>Group owners</br>Self-review | access reviews</br>Azure AD groups | Access panel |
59
59
| Assigned to a connected app | Specified reviewers</br>Self-review | access reviews</br>Azure AD enterprise apps (in preview) | Access panel |
60
-
| Azure AD role | Specified reviewers</br>Self-review |[PIM](../privileged-identity-management/pim-create-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)|Azure portal|
61
-
| Azure resource role | Specified reviewers</br>Self-review |[PIM](../privileged-identity-management/pim-create-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)|Azure portal|
60
+
| Azure AD role | Specified reviewers</br>Self-review |[PIM](../privileged-identity-management/pim-create-roles-and-resource-roles-review.md?toc=/azure/active-directory/governance/toc.json)|Microsoft Entra Admin Center|
Copy file name to clipboardExpand all lines: articles/active-directory/governance/check-status-workflow.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ ms.custom: template-how-to
18
18
When a workflow is created, it's important to check its status, and run history to make sure it ran properly for the users it processed both by schedule and by on-demand. To get information about the status of workflows, Lifecycle Workflows allows you to check run and user processing history. This history also gives you summaries to see how often a workflow has run, and who it ran successfully for. You're also able to check the status of both the workflow, and its tasks. Checking the status of workflows and their tasks allows you to troubleshoot potential problems that could come up during their execution.
19
19
20
20
21
-
## Run workflow history using the Azure portal
21
+
## Run workflow history using the Microsoft Entra admin center
You're able to retrieve run information of a workflow using Lifecycle Workflows. To check the runs of a workflow using the Azure portal, you would do the following steps:
25
+
You're able to retrieve run information of a workflow using Lifecycle Workflows. To check the runs of a workflow using the Microsoft Entra Admin center, you would do the following steps:
26
26
27
27
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Lifecycle Workflows Administrator](../roles/permissions-reference.md#lifecycle-workflows-administrator).
28
28
@@ -38,10 +38,9 @@ You're able to retrieve run information of a workflow using Lifecycle Workflows.
38
38
:::image type="content" source="media/check-status-workflow/run-list.png" alt-text="Screenshot of a workflow Runs list.":::
39
39
1. The runs summary cards include the total number of processed runs, the number of successful runs, the number of failed runs, and the total number of failed tasks.
40
40
41
-
## User workflow history using the Azure portal
42
-
43
-
To get further information than just the runs summary for a workflow, you're also able to get information about users processed by a workflow. To check the status of users a workflow has processed using the Azure portal, you would do the following steps:
41
+
## User workflow history using the Microsoft Entra admin center
44
42
43
+
To get further information than just the runs summary for a workflow, you're also able to get information about users processed by a workflow. To check the status of users a workflow has processed using the Microsoft Entra admin center, you would do the following steps:
45
44
46
45
1. In the left menu, select **Lifecycle Workflows**.
Workflow scheduling will automatically process the workflow for users meeting the workflows execution conditions. This article walks you through the steps to check the users who fall into the execution scope of a workflow. For more information about execution conditions, see: [workflow basics](../governance/understanding-lifecycle-workflows.md#workflow-basics).
21
21
22
-
## Check execution user scope of a workflow using the Azure portal
22
+
## Check execution user scope of a workflow using the Microsoft Entra admin center
Copy file name to clipboardExpand all lines: articles/active-directory/governance/conditional-access-exclusion.md
+36-34Lines changed: 36 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,43 +57,42 @@ Follow these steps to create a new Azure AD group and a Conditional Access polic
57
57
58
58
### Create an exclusion group
59
59
60
-
1. Sign in to the [Azure portal](https://portal.azure.com).
60
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [User Administrator](../roles/permissions-reference.md#user-administrator).
61
61
62
-
2. In the left navigation, select **Azure Active Directory** and then select **Groups**.
62
+
1. Browse to **Identity** > **Groups** > **All groups**.
63
63
64
-
3. On the top menu, select **New Group** to open the group pane.
64
+
1. Select **New group**.
65
65
66
-
4. In the **Group type** list, select **Security**. Specify a name and description.
66
+
1. In the **Group type** list, select **Security**. Specify a name and description.
67
67
68
-
5. Make sure to set the **Membership** type to **Assigned**.
68
+
1. Make sure to set the **Membership** type to **Assigned**.
69
69
70
-
6. Select the users that should be part of this exclusion group and then select **Create**.
70
+
1. Select the users that should be part of this exclusion group and then select **Create**.
71
71
72
72

73
73
74
74
### Create a Conditional Access policy that excludes the group
75
75
76
76
Now you can create a Conditional Access policy that uses this exclusion group.
77
77
78
-
1.In the left navigation, select **Azure Active Directory** and then select **Conditional Access** to open the **Policies** blade.
78
+
1.Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
79
79
80
-
2. Select **New policy**to open the **New** pane.
80
+
1. Browse to **Protection**> **Conditional Access**.
81
81
82
-
3. Specify a name.
82
+
1. Select **Create new policy**.
83
83
84
-
4. Under Assignments select **Users and groups**.
84
+
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.
85
85
86
-
5. On the **Include** tab, select **All Users**.
86
+
1. Under Assignments select **Users and groups**.
87
87
88
-
6. On the **Exclude** tab, add a checkmark to **Users and groups** and then
89
-
select **Select excluded users**.
88
+
1. On the **Include** tab, select **All Users**.
90
89
91
-
7. Select the exclusion group you created.
90
+
1. Under **Exclude**, select **Users and groups** and choose the exclusion group you created.
92
91
93
-
> [!NOTE]
92
+
> [!NOTE]
94
93
> As a best practice, it is recommended to exclude at least one administrator account from the policy when testing to make sure you are not locked out of your tenant.
95
94
96
-
8. Continue with setting up the Conditional Access policy based on your organizational requirements.
95
+
1. Continue with setting up the Conditional Access policy based on your organizational requirements.
97
96
98
97

99
98
@@ -104,42 +103,43 @@ Let's cover two examples where you can use access reviews to manage exclusions i
104
103
Let's say you have a Conditional Access policy that blocks access from certain countries/regions. It includes a group that is excluded from the policy. Here's
105
104
a recommended access review where members of the group are reviewed.
106
105
106
+

107
+
107
108
> [!NOTE]
108
-
> A Global administrator or User administrator role is required to create access reviews.
109
+
> A Global administrator or User administrator role is required to create access reviews. For a step by step guide on creating an access review, see: [Create an access review of groups and applications](create-access-review.md).
109
110
110
111
1. The review will happen every week.
111
112
112
-
2. Will never end in order to make sure you're keeping this exclusion group the most up to date.
113
+
1. Will never end in order to make sure you're keeping this exclusion group the most up to date.
113
114
114
-
3. All members of this group will be in scope for the review.
115
+
1. All members of this group will be in scope for the review.
115
116
116
-
4. Each user will need to self-attest that they still need access from these blocked countries/regions, therefore they still need to be a member of the
117
+
1. Each user will need to self-attest that they still need access from these blocked countries/regions, therefore they still need to be a member of the
117
118
group.
118
119
119
-
5. If the user doesn't respond to the review request, they'll be automatically removed from the group, and they'll no longer have access to the tenant while traveling to these countries/regions.
120
+
1. If the user doesn't respond to the review request, they'll be automatically removed from the group, and they'll no longer have access to the tenant while traveling to these countries/regions.
120
121
121
-
6. Enable email notifications to let users know about the start and completion of the access review.
122
+
1. Enable email notifications to let users know about the start and completion of the access review.
122
123
123
-

124
124
125
125
## Example 2: Access review for users accessing with legacy authentication
126
126
127
127
Let's say you have a Conditional Access policy that blocks access for users using legacy authentication and older client versions and it includes a group
128
128
that is excluded from the policy. Here is a recommended access review where members of the group are reviewed.
129
129
130
-
1. This review would need to be a recurring review.
130
+

131
131
132
-
2. Everyone in the group would need to be reviewed.
132
+
1. This review would need to be a recurring review.
133
133
134
-
3. It could be configured to list the business unit owners as the selected reviewers.
134
+
1. Everyone in the group would need to be reviewed.
135
135
136
-
4. Auto-apply the results and remove users that have not been approved to continue using legacy authentication methods.
136
+
1. It could be configured to list the business unit owners as the selected reviewers.
137
137
138
-
5. It might be beneficial to enable recommendations so reviewers of large groups can easily make their decisions.
138
+
1. Auto-apply the results and remove users that have not been approved to continue using legacy authentication methods.
139
139
140
-
6. Enable mail notifications so users are notified about the start and completion of the access review.
140
+
1. It might be beneficial to enable recommendations so reviewers of large groups can easily make their decisions.
141
141
142
-

142
+
1. Enable mail notifications so users are notified about the start and completion of the accessreview.
143
143
144
144
>[!IMPORTANT]
145
145
>If you have many exclusion groups and therefore need to create multiple access reviews, we now have an API in the Microsoft Graph beta endpoint that allows you to create and manage them programmatically. To get started, see the [access reviews API reference](/graph/api/resources/accessreviewsv2-overview) and [Example of retrieving access reviews via Microsoft Graph](https://techcommunity.microsoft.com/t5/Azure-Active-Directory/Example-of-retrieving-Azure-AD-access-reviews-via-Microsoft/td-p/236096).
@@ -148,15 +148,17 @@ that is excluded from the policy. Here is a recommended access review where memb
148
148
149
149
Now that you have everything in place, group, Conditional Access policy, and access reviews, it's time to monitor and track the results of these reviews.
150
150
151
-
1. In the Azure portal, open the **Access reviews** blade.
151
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least an [Identity Governance Administrator](../roles/permissions-reference.md#identity-governance-administrator).
152
+
153
+
1. Browse to **Identity governance** > **Access reviews**.
152
154
153
-
2. Open the control and program you have created for managing the exclusion group.
155
+
1. Select the Access review you are using with the group you created an exclusion policy for.
154
156
155
-
3. Select **Results** to see who was approved to stay on the list and who was removed.
157
+
1. Select **Results** to see who was approved to stay on the list and who was removed.
156
158
157
159

158
160
159
-
4. Then select**Audit logs** to see the actions that were taken during this review.
161
+
1. Select**Audit logs** to see the actions that were taken during this review.
0 commit comments